
SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog
Odyssey.conf 2025: Charting the Course for Cyber Resilience
March 4, 2025Last week, SecurityScorecard hosted our second annual Odyssey.conf in Miami, Florida. This year's conference focused on cyber resilience, providing attendees with actionable insights and cutting-edge strategies to navigate the ever-evolving threat landscape.
More DetailsSCDR -
Blog
Third-Party Risk Management Regulations: What You Should Know
February 18, 2025Third-party risk management regulations may seem like red tape nuisance at first, but these regulations ultimately reduce your organization’s risk as well. Learn more.
More Details -
Blog, Learning Center
Vendor Risk Assessment Template
February 13, 2025You can’t completely eliminate vendor risk, but you can manage it. Learn how to create a vendor risk assessment template with SecurityScorecard.
More DetailsTech Center -
Blog, Learning Center
The Ultimate Data Breach Response Plan
February 13, 2025In a hyper-connected world, data breaches continue to increase in size and scope. To bolster your cybersecurity posture, you should put together a data breach response plan as a way to prepare your organization.
More DetailsServices, Tech Center -
Blog
Lazarus Group Targets Developers Through NPM Packages and Supply Chain Attacks
February 13, 2025North Korea’s Lazarus Group is evolving its tactics again. The latest campaign, dubbed Operation Marstech Mayhem, introduces an advanced implant named "Marstech1."
More DetailsSTRIKE Team -
Blog
A Deep Peek at DeepSeek
February 10, 2025DeepSeek’s rapid ascent in the AI space has made it impossible to ignore. Its sophisticated models and AI assistant have captured global attention. And, while headlines focus on DeepSeek’s capabilities, STRIKE research exposes critical security flaws, hidden data flows, and unanswered questions about who has access to the data and why.
More DetailsSTRIKE Team -
Blog
Third-Party Risk Management Framework: How to Select the Right One
February 4, 2025Third parties come with significant cyber security risks. Learn how to select the right risk management framework.
More Details -
Blog
Beyond the Perimeter: Why CISOs Need Supply Chain Detection and Response
February 4, 2025Organizations rely heavily on external vendors and suppliers, creating complex supply chains vital for operations. However, this introduces a new dimension of risk: supply chain attacks. SCDR is a comprehensive security framework that focuses on identifying, assessing, and responding to threats within the supply chain.
More DetailsSCDR, Supply Chain Cyber Risk -
Blog
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
January 29, 2025In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named "Phantom Circuit," targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.
More DetailsSTRIKE Team -
Blog, Learning Center
Implementing Non-Repudiation in Your Security Strategy: Best Practices and Techniques
Explore best practices for implementing non-repudiation in security strategies to ensure transaction authenticity and protect against fraud.
More DetailsTech Center -
Blog
5 Reasons to Integrate Continuous Monitoring into Your TPRM Program
January 21, 2025Learn 5 reasons your organization should integrate continuous monitoring into their third-party risk management program. Read SecurityScorecard's blog
More Details -
Blog
What is the Threat Landscape?
January 17, 2025Discover the current threat landscape and learn how to identify, assess, and mitigate evolving cyber risks to protect your organization from potential attacks.
More Details